Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring

Tom-Michael Hesse, Stefan Gärtner, T. Roehm, B. Paech, K. Schneider, B. Brügge
{"title":"Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring","authors":"Tom-Michael Hesse, Stefan Gärtner, T. Roehm, B. Paech, K. Schneider, B. Brügge","doi":"10.1109/ESPRE.2014.6890520","DOIUrl":null,"url":null,"abstract":"Security issues can have a significant negative impact on the business or reputation of an organization. In most cases they are not identified in requirements and are not continuously monitored during software evolution. Therefore, the inability of a system to conform to regulations or its endangerment by new vulnerabilities is not recognized. In consequence, decisions related to security might not be taken at all or become obsolete quickly. But to evaluate efficiently whether an issue is already addressed appropriately, software engineers need explicit decision documentation. Often, such documentation is not performed due to high overhead. To cope with this problem, we propose to document decisions made to address security requirements. To lower the manual effort, information from heuristic analysis and end user monitoring is incorporated. The heuristic assessment method is used to identify security issues in given requirements automatically. This helps to uncover security decisions needed to mitigate those issues. We describe how the corresponding security knowledge for each issue can be incorporated into the decision documentation semiautomatically. In addition, violations of security requirements at runtime are monitored. We show how decisions related to those security requirements can be identified through the documentation and updated manually. Overall, our approach improves the quality and completeness of security decision documentation to support the engineering and evolution of security requirements.","PeriodicalId":274809,"journal":{"name":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ESPRE.2014.6890520","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Security issues can have a significant negative impact on the business or reputation of an organization. In most cases they are not identified in requirements and are not continuously monitored during software evolution. Therefore, the inability of a system to conform to regulations or its endangerment by new vulnerabilities is not recognized. In consequence, decisions related to security might not be taken at all or become obsolete quickly. But to evaluate efficiently whether an issue is already addressed appropriately, software engineers need explicit decision documentation. Often, such documentation is not performed due to high overhead. To cope with this problem, we propose to document decisions made to address security requirements. To lower the manual effort, information from heuristic analysis and end user monitoring is incorporated. The heuristic assessment method is used to identify security issues in given requirements automatically. This helps to uncover security decisions needed to mitigate those issues. We describe how the corresponding security knowledge for each issue can be incorporated into the decision documentation semiautomatically. In addition, violations of security requirements at runtime are monitored. We show how decisions related to those security requirements can be identified through the documentation and updated manually. Overall, our approach improves the quality and completeness of security decision documentation to support the engineering and evolution of security requirements.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用决策文档、启发式和用户监视的半自动安全需求工程和演进
安全问题可能对企业的业务或声誉产生重大的负面影响。在大多数情况下,它们没有在需求中被识别,并且在软件开发过程中没有被持续监控。因此,没有认识到系统无法符合规则或受到新的脆弱性的危害。因此,与安全性相关的决策可能根本不会被采纳,或者很快就会过时。但是为了有效地评估一个问题是否已经得到了适当的解决,软件工程师需要明确的决策文档。通常,由于高开销,不会执行此类文档。为了处理这个问题,我们建议记录为处理安全需求而做出的决策。为了降低人工工作量,从启发式分析和最终用户监控中获得的信息被合并。采用启发式评估方法自动识别给定需求中的安全问题。这有助于发现缓解这些问题所需的安全决策。我们描述了如何将每个问题的相应安全知识半自动地纳入决策文档。此外,在运行时对违反安全需求的行为进行监视。我们将展示如何通过文档识别和手动更新与这些安全需求相关的决策。总的来说,我们的方法提高了安全决策文档的质量和完整性,以支持安全需求的工程和演进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Supporting evolving security models for an agile security evaluation Towards a framework to measure security expertise in requirements analysis Pattern-based and ISO 27001 compliant risk analysis for cloud systems L-SQUARE: Preliminary extension of the SQUARE methodology to address legal compliance Argumentation-based security requirements elicitation: The next round
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1